Module 1 - Introduction to Incident Handling and Response

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

External Assessment

Assesses the network from a hacker's point of view to find out what exploits and vulnerabilities are accessible to the outside world

Formula for an Attack?

Attacks = Motive (Goal) + Method + Vulnerability

Mission Impact Analysis

Based on a qualitative or quantitative assessment of the sensitivity and criticality of the assets, prioritizes the impact levels associated with the compromise of those assets.

Defense-in-depth?

A security strategy in which security professionals use several protection layers throughout an information system.

Risk Management

A set of policies or procedures to identify, assess, prioritize, minimize and control risks.

Risk Mitigation

A strategic approach to preparing to handle risks and reduce their impact on the organization.

Internal Assessment

A technique to scan the internal infrastructure to uncover exploits and vulnerabilities.

Passive assessment

A technique used to sniff the network traffic to uncover active systems, network services, applications, and vulnerabilities

Non-repudiation

A way to guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message.

How do you define a "Threat"?

An undesired event that attempts to access, exfiltrate, manipulate, or damage the integrity, confidentiality, security, and availability of an organization's resources.

Economic Warfare

By blocking the flow of information, can affect the economy of a business or nation.

Threat intelligence

Collection and analysis of information about threats and adversaries. Includes drawing of patterns that inform knowledgeable decisions related to cyber attack preparedness, prevention, and response. Also known as "cyber threat intelligence (CTI)".

What are the 5 Elements of Information Security?

Confidentiality, Integrity, Availability, Authenticity, Non-Repudiation

Email Security Policy

Created to govern the proper usage of corporate email.

Nation state attribution

Deals with attributing attacks sponsored by one nation against another nation.

Group attribution

Deals with attributing based on the common group or association of multiple malicious actors and their attack methodologies.

Campaign attribution

Deals with attributing based on the malware or the campaign strategy of specific malware.

Intrusion-set Attribution

Deals with attributing the attacker based on the intrusion patterns.

True Attribution

Deals with the identification of the specific person, society, or a country sponsoring a well-planned and executed intrusion or attack over its target.

Firewall Management Policy

Defines access, management, and monitoring of firewalls in organization.

Acceptable Use Policy

Defines the acceptable use of system resources.

User-Account Policy

Defines the account creation process and the authority, rights and responsibilities of user accounts.

Access Control Policy

Defines the resources being protected and the rules that control access to them.

Information Protection Policy

Defines the sensitivity levels of information, who may have access, how information is stored and transmitted, and how information should be deleted from storage media.

Special Access Policy

Defines the terms and conditions of granting special access to system resources.

Remote-Access Policy

Defines who can have remote access, defines access medium, and defines remote access security controls.

Network Connection Policy

Defines who can install new resources on the network, approve the installation of new devices, document network changes, etc.

Risk

Degree of uncertainty or expectation of potential damage that an adverse event may cause to the system or resources under specified conditions.

Network Assessments

Determines the possible network security attacks that may be waged on the organization's system

Host-Based Assessment

Determines the vulnerabilities in a specific workstation or server by performing a configuration-level check through the command line.

Wireless Network Assessments

Determines the vulnerabilities in the organization's wireless networks

Tangible Cost

Direct expenditures related to an incident. Can be quantified and identified (i.e., lost productive hours, loss of business, loss or theft of resources).

Vulnerability assessment

Examination of the ability of a system or application, including current security procedures and controls, to withstand assault. Recognizes, measures, and classifies security vulnerabilities in computer systems, networks, and communication channels.

Intangible Cost

Expenditures that the org cannot calculate directly or value accurately (i.e., damage to corporate reputation, loss of goodwill, psychological damage, damage to shareholder's value).

Authenticity

Genuineness or uncorruptedness of any communication, document or data.

Threat Correlation

Helps organization to monitor, detect and escalate various evolving threats from organizational networks. Main objective is to reduce false positive alert rates and detect and escalate stealthy, complex attacks.

What are the most common threat sources?

Human, natural, environmental

Common sources of Precusors and Indicators:

IDPS, SIEM, Antivirus/Antispam Software, File Integrity Checking Software, Third-Party Monitoring Services, OS/Service/Network/Application Logs.

Risk Assessment

Identification of risks, estimation of their impact, and determination of sources to recommend proper mitigation measures. Identification of risk is the initial step of the risk management plan.

Asset criticality assessment

Identifies and prioritize the sensitive and critical information assets that support the critical missions of the organization.

Network devices susceptible to vulnerabilities:

・Access points ・Routers ・Wireless routers ・Switches ・Firewall

Top infosec Attack Vectors?

・Cloud Computing Threats ・Advanced Persistent Threats (APT) ・Viruses and Worms ・Ransomware ・Mobile Threats ・Botnet ・Insider Attack ・Phishing ・Web Application Threats ・Internet of Things (IoT) Threats

Typical motives behind infosec attacks?

・Disruption business continuity ・Performing information theft ・Manipulating data ・Creating fear and chaos by disrupting critical infrastructure ・Bringing financial loss to the target ・Propagating religious or political beliefs ・Achieving the state's military objectives ・Damaging the reputation of the target ・Taking revenge ・Demanding ransom ・Fun/thrills/exploration

What are some of the impacts of an Information Security Attack?

・Financial Losses ・Loss of Confidentiality and Integrity ・Damaged Customer Relationship ・Loss of Business Reputation ・Legal and Compliance Issues ・Operational Iimpacts

Typical Application threats?

・Improper data/input validation ・Authentication and authorization attacks ・Security misconfiguration ・Improper error handling and exception management ・Information disclosure ・Hidden-field manipulation ・Broken session management ・Buffer overflow issues ・Cryptography attacks ・SQL injection ・Phishing

Typical network threats?

・Information gathering ・Sniffing and eavesdropping ・Spoofing ・Session hijacking ・Man-in-the-middle attack ・DNS and ARP poisoning ・Password-based attacks ・Denial-of-service attack ・Compromised-key attack ・Firewall and IDS attacks

Types of information security incidents:

・Malicious Code or Insider Threat Attacks ・Unauthorized Access ・Unauthorized Usage of Services ・Email-based Abuse ・Espionage ・Fraud and Theft ・Employee Sabotage and Abuse ・Network and Resources Abuses ・Resource Misconfiguration Abuses

Typical Host threats?

・Malware attacks ・Footprinting ・Profiling ・Password attacks ・Denial-of-service attacks ・Arbitrary code execution ・Unauthorized access ・Privilege escalation ・Backdoor attacks ・Physical security threats

Vulnerability Classifications:

・Misconfigurations ・Default Installations ・Buffer Overflows ・Unpatched Servers ・Design Flaws ・Operating System Flaws ・Application Flaws ・Open Services ・Default Passwords

Common areas of vulnerability in applications:

・Networking software ・Network operations and management ・Firewall and network security applications ・Database software

What information does a vulnerability scanner identify?

・OS version running on computers or devices ・IP and Transmission Control Protocol/User Datagram Protocol (TCP/UDP) ports that are listening ・Applications installed on computers ・Accounts with weak passwords ・Files and folders with weak permissions ・Default services and applications that might have to be uninstalled ・Mistakes in the security configuration of common applications ・Computers exposed to known or publicly reported vulnerabilities

Commonly Targeted Assets

・Personal Details ・Financial Information ・Intellectual Property ・Sensitive Business Data ・Login Details and IT System Information

Characteristics of an information asset?

・Recognized to be of value ・Considered an asset to the org ・Difficult to replace with cost, skills, time and resources ・Part of the org's corporate identity ・Data classified as an information asset are confidential and proprietary ・Plays a significant role in the org's business ・Organized documentation that motivates the org to achieve its goals ・Maintained by people working in a consistent and cooperative manner. ・Can be part of a unique enterprise application or part of one. The loss of information affects the org's investments in different business activities.

What are the goals of security policies?

・Reduce or eliminate legal liability of employees and third parties. ・Protect confidential and proprietary information from them, misuse, unauthorized disclosure, or modification. ・They prevent wastage of the company's computing resources.

Commonly used correlation techniques:

・Relating multiple incident types and sources across multiple nodes ・Incident sequence ・Incident persistence ・Incident-directed data collection

What are the types of threat actors?

・Script kiddies ・Organized hackers ・Hacktivists ・State-sponsored Attackers ・Insider Threat ・Cyber Terrorists ・Recreational Hackers ・Suicide Hackers ・Industrial Spies

What's the difference between technical and administrative security policies?

・Technical security policies describe the configuration of the technology for convenient use. ・Administrative security policies address how all persons should behave.

Common areas of Vulnerability:

・Users ・Operating System ・Applications ・Network Devices ・Network Infrastructure ・Internet of Things (IoT) ・Configuration Files

What processes are included under Incident Management?

・Vulnerability analysis ・Artifact analysis ・Security awareness training ・Intrusion Detection ・Technology Monitoring

Offensive Information Warfare

Involves attacks against ICT assets of an opponent to compromise the target's assets.

Impact analysis

Involves estimating the adverse impact of exploitation of a vulnerability by a threat source.

Incident Management

It is a set of defined processes used to identify, analyze, prioritize, and resolve security incidents and restore a system to normal service and operations as soon as possible while preventing further recurrence of the incident. It improves service quality, resolves problems proactively, reduces impacts of incidents, meets service availability requirements, increases staff efficiency and productivity, improves user/customer satisfaction and assists in handling future incidents.

What are the three main categories of information security threats?

Network threats, Host threats and Application Threats

What is a Promiscuous Policy?

No restrictions on usage of system resources.

Threat Targets and Assets

Organizational resources attacked by threat actors in order to gain control or steal information and launch further attacks on the organization.

What is a Permissive Policy?

Policy begins wide open and only know dangerous services, attacks or behaviors are blocked. Regularly updated to ensure effectiveness.

Paranoid Policy

Policy forbids everything, no internet connection/severely limited internet usage

What is a Prudent Policy?

Policy provides maximum security while allowing known but necessary dangers. Blocks all services and only safe/necessary services are enabled individually; everything is logged.

Two categories of incident signs:

Precusor - indicates the possibility of the occurrence of a security incident in the future (i.e., threats from hackers, new exploit, etc.) Indicators - sign representing that the incident has probably occurred or is currently in progress (i.e., warning from AV or scanner, Firewall/IDS/IPS alerts, web server unavailability).

Vulnerability Management

Proactive approach designed to identify, classify, and mitigate vulnerabilities.

Threat Contextualization

Process of assessing threats and their impacts under various (contextual) conditions. Threat context is obtained by detecting and analyzing current vulnerabilities in the IT resources, such as networks and information systems.

Threat assessment

Process of examining, filtering, transforming, and modeling of acquired threat data to extract threat intelligence.

Threat Attribution

Process of identifying and attributing the actors behind an attack as well as their goals, motives and sponsors.

Passwords Policy

Provides guidance for using strong password protection on organization's resources.

Likelihood Analysis

The calculation of probability that a threat source exploits an existing system vulnerability

What is a vulnerability?

The existence of a weakness or a design or implementation error that, when exploited, leads to an unexpected an undesirable event that compromises the security of the system.

Risk Determination

The probability of occurrence of an anticipated incident.

Control analysis

The process of analyzing various security controls implemented by the organization to eradicate or minimize the probability that a threat will exploit a system vulnerability.

Cost of an incident?

The sum of the total amount lost directly and indirectly due to the attack and the amount spent on recovering from the incident, including IH&R functions. Orgs typically employ financial auditors to estimate the total cost.

InfoWar

The use of information and communication technologies (ICT) for competitive advantages over an opponent.

Cyber Warfare

The use of information systems against the virtual personas of individuals or groups.

Integrity

Trustworthiness of data or resources in the prevention of improper and unauthorized changes.

Psychological Warfare

Use of various techniques such as propaganda and terror to demoralize one's adversary in an attempt to succeed in battle.

Active assessment

Uses a network scanner to find hosts, services, and vulnerabilities

Electronic Warfare

Uses radio-electronic and cryptographic techniques to degrade communication.

Hacker warfare

Various purposes including theft of information, false messaging and other infosec attacks.

Steps in the Vulnerability Management Life Cycle

1) Baseline Creation 2) Vulnerability Assessment 3) Risk Assessment 4) Remediation 5) Verification 6) Monitoring

IH&R Steps

1) Preparation 2)Incident Recording and Assignment 3) Incident Triage 4) Notification 5) Containment 6) Evidence Gathering and Forensic Analysis 7) Eradication 8) Recovery 9) Post-Incident Activities

What are the steps in Risk Assessment?

1) System Characterization 2) Threat Identification 3) Vulnerability Identification 4) Control Analysis 5) Likelihood Analysis 6) Impact Analysis 7) Risk Determination 8) Control Recommendation 9) Risks Assessment Report

Availability

The assurance that the systems responsible for delivering, storing, and processing information area accessible when required by authorized users.

Intelligence-based Warfare

Sensor-based technology that directly corrupts technological systems.

How do Security Experts and vulnerability scanners classic vulnerabilities?

Severity Level: low, medium or high Exploit Range: Local or remote

Motive?

A motive originates from the notion that the target system stores or processes something valuable; this signals that the system may be under threat of an attack.

What is a "threat actor"?

A person or entity responsible for the harmful incidents or with the potential to impact the security of an organization's network.

Incident Handling and Response (IH&R)

A process of taking organized and careful steps when reacting to a security incident or cyberattack.

Defensive Information Warfare

Refers to all the strategies and actions for security professionals and incident responders to defend their organization its ICT assets from cyber attackers.

Command-and-control Warfare (C2 Warfare)

Refers to the impact an attacker possesses over a compromised system or network that they control.

Information security

Refers to the protection or safeguarding of information and information systems (i.e., systems that use, store and transmit information) from unauthorized accesses, disclosures, alterations, and destruction.

Application Assessments

Tests the web infrastructure for any misconfigurations and known vulnerabilities

Confidentiality

The assurance that information is accessible only to those who are authorized to have access.


संबंधित स्टडी सेट्स

Coding Data Basics Test Study Guide

View Set

Chapter 30: An Introduction to Animals

View Set

Chapter 3 Comparative Advantage and The Gains from Trade

View Set